Summary
You now have the knowledge needed to move forward in this book. This chapter included an overview of pentesting techniques, as well different types of pentesting and how it's executed. It is important to briefly understand how pentesting can be used in different ways, such as red teaming or goal-oriented pentesting. We will look at more ways throughout this book and will remind you when those instances come up.
The big test in this chapter was scanning our AWS host and then connecting to it over RDP. We displayed both theory and practical knowledge in how we can scan our host to successfully enumerate and use that information to connect to the host. We will be using similar techniques and methods during this book – so make sure you keep what you've learned so far as a baseline for this book.
In the next chapter, we are going to be moving forward with a much more hands-on topic and begin to exploit AWS services.